File:The Legal, Technical, and Practical Challenges of Countering the Commercial Drone Threat to National Security (IA thelegaltechnica1094563191).pdf

From Wikimedia Commons, the free media repository
Jump to navigation Jump to search
Go to page
next page →
next page →
next page →

Original file(1,275 × 1,650 pixels, file size: 612 KB, MIME type: application/pdf, 33 pages)

Captions

Captions

Add a one-line explanation of what this file represents

Summary[edit]

The Legal, Technical, and Practical Challenges of Countering the Commercial Drone Threat to National Security   (Wikidata search (Cirrus search) Wikidata query (SPARQL)  Create new Wikidata item based on this file)
Author
Ward, Allison
Title
The Legal, Technical, and Practical Challenges of Countering the Commercial Drone Threat to National Security
Publisher
Monterey, California. Naval Postgraduate School
Description

Commercial-off-the-shelf (COTS) drones ヨ also referred to as unmanned aircraft systems (UAS) or quadcopters ヨ are nearly ubiquitous. In the U.S. alone, the Federal Aviation Administration (FAA) モprojects the small model hobbyist UAS fleet to more than double from an estimated 1.1 million vehicles in 2017 to 2.4 million units by 2022.ヤ Given their range, photographic capability, and relatively low cost, they appeal to everyone from real estate agents to insurance claims adjusters to tech geeks to the Department of Defense (DoD) to terrorist actors. Their ubiquity and accessibility pose a growing concern to national security. Recognizing the potential impact to national security, as well as the tension between available counter-UAS (cUAS) systems and sections of title 18, U.S. Code, including the Aircraft Sabotage Act, Computer Fraud and Abuse Act, and the Wiretap Act, Congress has started passing legislation designed to assist Federal agencies with mitigating the threat posed by rogue UAS (e.g., 10 U.S.C. 130i; P.L. 115-302). There is no perfect cUAS interdiction solution, but hacking ヨ including spoofing ヨ may the most promising solution, with the least potential for collateral damage, thereby also likely making it the most compliant with the law enforcement principle of using non-lethal incapacitating weapons that minimize the risk of endangering uninvolved people.
Subjects: drone, UAV, UAS, cUAS, quadcopter, electromagnetic spectrum, jamming, hacking, spoofing, covered

facility or asset
Language English
Publication date May 2019
Current location
IA Collections: navalpostgraduateschoollibrary; fedlink
Accession number
thelegaltechnica1094563191
Source
Internet Archive identifier: thelegaltechnica1094563191
https://archive.org/download/thelegaltechnica1094563191/thelegaltechnica1094563191.pdf
Permission
(Reusing this file)
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.

Licensing[edit]

Public domain
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code. Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current07:45, 25 July 2020Thumbnail for version as of 07:45, 25 July 20201,275 × 1,650, 33 pages (612 KB) (talk | contribs)FEDLINK - United States Federal Collection thelegaltechnica1094563191 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #29885)

Metadata